scholarly journals Organizational attractiveness after identity threats of crises: how potential employees anticipate social identity

Author(s):  
Greta Onken-Menke ◽  
Ghita Dragsdahl Lauritzen ◽  
Stephan Nüesch ◽  
Johann Nils Foege
2013 ◽  
Vol 44 (6) ◽  
pp. 361-372 ◽  
Author(s):  
Natascha de Hoog

The underlying process of reactions to social identity threat was examined from a defense motivation perspective. Two studies measured respondents’ social identification, after which they read threatening group information. Study 1 compared positive and negative group information, attributed to an ingroup or outgroup source. Study 2 compared negative and neutral group information to general negative information. It was expected that negative group information would induce defense motivation, which reveals itself in biased information processing and in turn affects the evaluation of the information. High identifiers should pay more attention to, have higher threat perceptions of, more defensive thoughts of, and more negative evaluations of negative group information than positive or neutral group information. Findings generally supported these predictions.


2016 ◽  
Vol 7 (4) ◽  
pp. 539-559 ◽  
Author(s):  
Mohamad Abu Huzaifah bin Magbool ◽  
Azlan Amran ◽  
Mehran Nejati ◽  
Krishnaswamy Jayaraman

Purpose This study aims to investigate whether organizations can leverage on their sustainable business practices to attract valuable talents to gain competitive advantage over their competitors. Design/methodology/approach Using factorial design, the authors conducted an experiment to assess the attractiveness of an organization in line with the social identity theory, based on the Bursa Malaysia corporate social responsibility (CSR) framework attributes (including environmental performance, community relation, workplace and marketplace performance). Findings The findings of the current study supported the notion of social identity theory, as study subjects were attracted more to organizations with high corporate sustainable business (CSB) practices than organizations with low CSB practices. Specifically, findings of the current study revealed that job applicants have a higher intention to join and willingness to accept a job offer from organizations with more sustainable business practices. Research limitations/implications This study is limited by its sample size and selection, self-reported measures and its cross-sectional nature. Practical implications Understanding the most preferred attribute of CSB practices will enable organizations to focus their valuable resources rightfully to market their CSR efforts for obtaining higher organizational attractiveness and competitive advantage. Social implications As many organizations perceive sustainable outcomes to be costly, demonstrating the positive link between CSB practices and organizational attractiveness for talents warrants a win-win paradigm. Originality/value Talented workforce is essential for differentiating an organization from its competitors. As human resources are mostly unique and non-imitable, it has been recommended as a newly minted strategy to enable organization to achieve sustainable competitive advantages.


2016 ◽  
Vol 35 (3) ◽  
pp. 205-220 ◽  
Author(s):  
Oscar Holmes IV ◽  
Marilyn V. Whitman ◽  
Kim S. Campbell ◽  
Diane E. Johnson

Purpose – The purpose of this paper is to explore what individuals perceive as social identity threats, the sources of the threat, individuals’ responses, and the consequences of the threat. Design/methodology/approach – Narratives from 224 individuals were collected. A sample of 84 narratives were analyzed in depth using a qualitative content analysis approach. Findings – Initial support for identity threat response theory was found. Three new distinct threat responses – constructive action, ignore, and seek assistance – were uncovered. Additionally, harm/loss appraisals were found to be perceived and reacted to similarly to Petriglieri-defined identity threats. Originality/value – This study contributes to identity scholarship by shedding further light on the “theoretical black box” associated with identity threat. Such insight is necessary in further enhancing our understanding of the impact that identity threat has at the individual and organizational level.


2020 ◽  
pp. 136843021988827 ◽  
Author(s):  
Hilary B. Bergsieker ◽  
Matthew O. Wilmot ◽  
Emily N. Cyr ◽  
Charnel B. Grey

Integrating social identity threat and structural hole theories, this work examines how social network positions affect group-based identity threats. For individuals less well positioned to bridge (or “broker”) relations between unconnected friends, stigma-by-association concerns may constrain affiliation with stereotypic targets. Three experiments ( Ns = 280, 232, 553) test whether women (vs. men) in male-dominated STEM (vs. female-dominated) majors avoid befriending a female target with feminine-stereotypic (vs. STEM-stereotypic) interests. Only STEM women with less brokerage (i.e., less ability to manage introductions to unconnected friends) in their existing friendship networks avoided befriending (pilot experiment) and socially integrating (Experiments 1 and 2) feminine- (vs. STEM-) stereotypic targets, despite standardized target similarity and competence. STEM women in particular anticipated steeper reputational penalties for befriending stereotypically feminine peers (Experiment 2). Social identity threat may lead women in STEM—especially those lacking brokerage—to exclude stereotypically feminine women from social networks, reinforcing stereotypes of women and STEM fields.


2019 ◽  
Vol 37 ◽  
pp. 101171
Author(s):  
Tomoyuki Kobayashi ◽  
Kazuki Yoshida ◽  
Yoshitake Takebayashi ◽  
Aya Goto ◽  
Atsushi Kumagai ◽  
...  

2020 ◽  
Author(s):  
Ammar Almustafa

<p>This policy is advanced in a transformative proactive manner to address the needs of Uber Technologies to manage diversity in a male-dominated tech sector. The policy is proposed after a series of internal struggles and unflattering media attention to help delineate the procedure as well as the rationale for the achieving gender diversity. Social identity and Social identity threats are discussed in relation to gender and work as well as the business case for diversity in a tech company. Recommendations and advice are made to advance diversity and manage resistance on an individual level, an organizational culture level and a procedure level.</p>


2020 ◽  
Author(s):  
Ammar Almustafa

<p>This policy is advanced in a transformative proactive manner to address the needs of Uber Technologies to manage diversity in a male-dominated tech sector. The policy is proposed after a series of internal struggles and unflattering media attention to help delineate the procedure as well as the rationale for the achieving gender diversity. Social identity and Social identity threats are discussed in relation to gender and work as well as the business case for diversity in a tech company. Recommendations and advice are made to advance diversity and manage resistance on an individual level, an organizational culture level and a procedure level.</p>


Sign in / Sign up

Export Citation Format

Share Document